O'Reilly logo

Metasploit Penetration Testing Cookbook - Second Edition by Abhinav Singh, Monika Agarwal

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 4. Client-side Exploitation and Antivirus Bypass

In this chapter, we will cover:

  • Exploiting Internet Explorer execCommand Use-After-Free vulnerability
  • Understanding Adobe Flash Player "new function" invalid pointer use
  • Understanding Microsoft Word RTF stack buffer overflow
  • Working with Adobe Reader U3D Memory Corruption
  • Generating binary and shellcode from msfpayload
  • Msfencoding schemes with the detection ratio
  • Using the killav.rb script to disable the antivirus programs
  • Killing antivirus services from the command line
  • Working with the syringe utility

Introduction

In the previous chapter, we focused on penetration testing on the target operating system. Operating systems are the first level of penetrating the target because an unpatched and outdated ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required